About Maki Library

Thank you for your interest in the Maki Library!

The library of Finlandia University has existed in some form since Suomi College was founded in 1896. In 1996 the first baccalaureate programs were initiated. Prior to that time the college offered only associate degree programs. On July 1, 2000, Suomi College became Finlandia University. The Library moved into its present quarters in 1966 when the Wargelin classroom building was completed. That library, occupying the ground floor of Wargelin Hall, was a facility of about 5,000 square feet. In 1995 Sulo and Aileen Maki donated one million dollars to the College to enlarge and renovate the library. Upon completion of this project in the late summer of 1997, the library doubled its size and was re-named the Sulo and Aileen Maki Library in honor of its benefactors. It now has a book capacity of approximately 65,000 volumes. Additionally, the renovation and addition have created a warm and inviting space for study, research, and recreational reading.

Mission

Maki Library’s environment supports open inquiry, personal growth, and collaboration, as a creative force in developing knowledgeable, educated students. It promotes learning, educates students, faculty, and staff in information literacy skills and concepts, and serves as a cultural enrichment resource for the entire campus and community.

Vision

That the information services provided by Maki Library will be central to the University’s teaching / learning and administrative activities, and that they will be highly valued by the campus community.

That information literacy instruction, in collaboration with classroom faculty and by librarians, will result in information literate students capable of lifelong learning and who are equipped to meet the information challenges of the 21st Century.

That the library will integrate appropriate information technologies into its services and operations and will collaborate in campus information technological activities.

Work Study Training Worksheet

Name: ___________________________

Maki Library Work Study Training worksheet

Due: Monday, November 16, 2015

Work though during your shifts, ask questions, and hand in when complete.

What things can you do as a Work Study and at future jobs to show your work ethic?____________________________________________________________________________________________________________________________________________________________________________________________________________________________

Choose another video to watch from the above website, report topic: ______________________ and what you learned/reinforced?

How do you like to be treated as a customer?________________________________________________________________________________________________________________________________________________________________________________________________________________________

What things can you do as a Work Study to provide good customer service?__________________________________________________________________________________________________________________________________________________________________________________________________________________________

What is the generic username and password for circulation desk and library computers (doesn’t work in business lab)? ______________________________________________________________________________

Read At a Glance document, write down at least one thing you didn’t know._______________________________________________________________________________________________________________________________________________________

Course reserves is there any instance when a reserve item shouldn’t be checked out (headphones, digital recorders, books, articles?)

Use Maki Library databases to complete–Pick topic: _______________Find journal articles on the above stated topic. Which database did you use and how many articles were found? _______ of those, how many peer reviewed articles were found on your topic? ___________

Is there a difference between desensitizer/sensitizer a book and DVD/CD/Video? If so, what is it? ____________________________________________________________________________________________________________________________________________________________

What is something you should watch for on screen when charging or discharging materials? ____________________________________________________________________________________________________________________________________________________________

I am looking for a peer reviewed journal article, where should I go? ____________________________________________________________________________________________________________________________________________________________

Change date stamp to your birthday and STAMP here ______________ and now return to

today’s date and STAMP here________________

Using WebVoyage, how many books authored by John Green (1977) does the Maki Library

have? __________Of those, how many are available today? __________________

Where might you find commonly used forms that you can use masters to make copies? ________________________________________________________________________

Library use is a privilege. If an individual or group is not adhering to the Library Code of Conduct, other library users may report the code violation to library staff or workers. The library is often the only place on campus where students can have a quiet place to study. The library is for academic uses first and foremost, recreational activities, if disturbing to others, may be taken to other locations on campus. Anyone violating the Library Code Of Conduct, the Computer, Internet and E-mail User Acceptable Use Policy, or state and federal laws can be asked to leave the library and may be refused future access. Security and/or police may be called to enforce these policies.

Individuals will:

Comply with all Library and University policies, including the Computer, Internet and E-mail Acceptable Use policy, Library Code of Conduct

Leave building at closing time and only use authorized areas, ie, not the library staff office area

Respond to security gate alarms, emergency alarms and other situations as instructed by the library staff

Adhere to federal Copyright Law, as posted

Individuals will not engage in illegal or prohibited activities, including but not limited to:

• Children will be supervised

• Drinks must have a lid, snack or bagged lunch food is allowed, no ‘to-go’ or ‘take away’ hot food

• No tobacco use, including smokeless tobacco products such as e-cigarettes or chew

• Front journal and magazine area (area in front of circulation desk) is for quiet conversation

• No phone conversations in the library

• Back area of the library, including the computers, is a QUIET ZONE, only whispering will be allowed. Low volume conversations may be had in the front of the library.

• Academic use of computers has priority over recreational use, students have priority over community members

• Headphone volume must be kept low enough as to not disturb others

• Displays of threatening or intimidating behavior, such as abusive language, threats of violence, harassment.

• Behavior that is potentially unsafe or harmful to others

• Damage to Library materials, including but not limited to defacing books, magazines, removing pictures or security devices.

Please stop at the front desk of the library to fill out a Courtsey Card Agreement. First and foremost, community patron’s access to the Sulo & Aileen Maki Library is a privilege, not a right. Finlandia University is a private institution and as such can revoke library access to any community patron for any reason without warning. Concerns, problems or policy violations may be reported to library staff members or front desk worker.

NOTE: Children are welcome to be here, but be aware that there are not filters on the computers and you must monitor your child(ren) at all times.

Patron must meet the following requirements:

16 years if age or older

proper identification (a current Michigan drivers’ license or a Michigan State ID Card).

live or work in the local area, Houghton or Keweenaw County

provide contact information, either a phone number or e-mail account

Sign in and out at the front desk in order to use the computers

not be banned from the campus of Finlandia University

agree and adhere to policies laid out in this agreement

monitor underage children

It is the responsibility of the community patron to adhere to agree to the following policies:

Community Courtesy Card Agreement

Finlandia University Computer, Internet and E-mail Acceptable Use Policy

Call, e-mail or stop by BEFORE due date to renew, renewal may be denied if a student has requested the same item

Lost items will incur a $40 replacement fee plus $5 processing fee, you may purchase a similar copy to replace lost items, must be same format (paperback or hardcover, dvd or cd) and condition (new, or in main stacks, used) as original item borrowed

Courtsey patrons are subject to the Computer, Internet and E-mail Acceptable Use Policies, computer and internet access is a privledge extended to community patrons. Student’s also follow this policy and must follow the Student Code of Conduct, as well.

Finlandia University provides network computer access, access to the Internet, and e-mail services as tools to enhance educational opportunities, to foster professional development and to promote business efficiencies for the entire campus community. Any use outside of these parameters is considered unacceptable and users in violation will risk the loss of library courtesy card and all library services.

Finlandia University connects to the Internet via REMC1Net and MichNet (MERIT) and is subject to the acceptable use policies of those providers. The Finlandia University Information Technology staff has the ability to monitor and may monitor any activity on the networks or inspect any files at any time, including e-mail stored on the systems. Privacy is NOT guaranteed.

Examples of inappropriate conduct and use may include, but are not limited to:

Transmission of material, information or software in violation of any local, state or federal law;

Malicious attempts to interfere with the use of the network by other users, including intentional misappropriation of files, data or passwords from other users;

Deliberate creation or dissemination of computer viruses;

Use creating routing patterns that are inconsistent with effective and shared use of the network, precluding or hampering use by other users (such as peer-to-peer networking programs used to illegally share files)